


Остановите войну!
for scientists:


default search action
Krzysztof Pietrzak
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c91]Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak:
Efficiently Testable Circuits. ITCS 2023: 10:1-10:23 - [c90]Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak:
Certifying Giant Nonprimes. Public Key Cryptography (1) 2023: 530-553 - [i74]Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak:
Certifying Giant Nonprimes. IACR Cryptol. ePrint Arch. 2023: 238 (2023) - 2022
- [c89]Charlotte Hoffmann
, Pavel Hubácek
, Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
Practical Statistically-Sound Proofs of Exponentiation in Any Group. CRYPTO (2) 2022: 370-399 - [c88]Joël Alwen, Benedikt Auerbach
, Miguel Cueto Noval
, Karen Klein, Guillermo Pascual-Perez
, Krzysztof Pietrzak, Michael Walter:
CoCoA: Concurrent Continuous Group Key Agreement. EUROCRYPT (2) 2022: 815-844 - [c87]Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo:
Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks. Financial Cryptography 2022: 358-373 - [i73]Samarth Tiwari, Michelle Yeo, Zeta Avarikioti, Iosif Salem
, Krzysztof Pietrzak, Stefan Schmid:
Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation. CoRR abs/2205.11597 (2022) - [i72]Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter:
CoCoA: Concurrent Continuous Group Key Agreement. IACR Cryptol. ePrint Arch. 2022: 251 (2022) - [i71]Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak:
Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging. IACR Cryptol. ePrint Arch. 2022: 559 (2022) - [i70]Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
Practical Statistically-Sound Proofs of Exponentiation in any Group. IACR Cryptol. ePrint Arch. 2022: 1021 (2022) - [i69]Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak:
Efficiently Testable Circuits. IACR Cryptol. ePrint Arch. 2022: 1598 (2022) - 2021
- [c86]Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs:
Limits on the Adaptive Security of Yao's Garbling. CRYPTO (2) 2021: 486-515 - [c85]Benedikt Auerbach
, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez
, Krzysztof Pietrzak, Michael Walter
, Michelle Yeo:
Inverse-Sybil Attacks in Automated Contact Tracing. CT-RSA 2021: 399-421 - [c84]Krzysztof Pietrzak, Iosif Salem
, Stefan Schmid, Michelle Yeo:
LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks. Networking 2021: 1-9 - [c83]Karen Klein, Guillermo Pascual-Perez, Michael Walter, Chethan Kamath, Margarita Capretto, Miguel Cueto
, Ilia Markov, Michelle Yeo, Joël Alwen, Krzysztof Pietrzak:
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement. IEEE Symposium on Security and Privacy 2021: 268-284 - [c82]Joël Alwen, Benedikt Auerbach
, Mirza Ahad Baig
, Miguel Cueto Noval
, Karen Klein, Guillermo Pascual-Perez
, Krzysztof Pietrzak, Michael Walter
:
Grafting Key Trees: Efficient Key Management for Overlapping Groups. TCC (3) 2021: 222-253 - [c81]Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo:
Trojan-Resilience Without Cryptography. TCC (2) 2021: 397-428 - [c80]Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
On Treewidth, Separators and Yao's Garbling. TCC (2) 2021: 486-517 - [c79]Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:
The Cost of Adaptivity in Security Games on Graphs. TCC (2) 2021: 550-581 - [i68]Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Michelle Yeo:
LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks. CoRR abs/2104.04293 (2021) - [i67]Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo:
HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks. CoRR abs/2110.08848 (2021) - [i66]Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:
On the Cost of Adaptivity in Graph-Based Games. IACR Cryptol. ePrint Arch. 2021: 59 (2021) - [i65]Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
On Treewidth, Separators and Yao's Garbling. IACR Cryptol. ePrint Arch. 2021: 926 (2021) - [i64]Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs:
Limits on the Adaptive Security of Yao's Garbling. IACR Cryptol. ePrint Arch. 2021: 945 (2021) - [i63]Joël Alwen, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter:
Grafting Key Trees: Efficient Key Management for Overlapping Groups. IACR Cryptol. ePrint Arch. 2021: 1158 (2021) - [i62]Suvradip Chakraborty, Stefan Dziembowski
, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo:
Trojan-Resilience without Cryptography. IACR Cryptol. ePrint Arch. 2021: 1224 (2021) - [i61]Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem
, Stefan Schmid, Samarth Tiwari, Michelle Yeo:
HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks. IACR Cryptol. ePrint Arch. 2021: 1401 (2021) - [i60]Zeta Avarikioti, Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, Michelle Yeo:
Route Discovery in Private Payment Channel Networks. IACR Cryptol. ePrint Arch. 2021: 1539 (2021) - 2020
- [c78]Krzysztof Pietrzak:
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing. INDOCRYPT 2020: 3-15 - [e3]Rafael Pass, Krzysztof Pietrzak:
Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12550, Springer 2020, ISBN 978-3-030-64374-4 [contents] - [e2]Rafael Pass, Krzysztof Pietrzak:
Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12551, Springer 2020, ISBN 978-3-030-64377-5 [contents] - [e1]Rafael Pass, Krzysztof Pietrzak:
Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12552, Springer 2020, ISBN 978-3-030-64380-5 [contents] - [i59]Krzysztof Pietrzak:
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 418 (2020) - [i58]Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo:
Inverse-Sybil Attacks in Automated Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 670 (2020)
2010 – 2019
- 2019
- [c77]Hamza Abusalah
, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
:
Reversible Proofs of Sequential Work. EUROCRYPT (2) 2019: 277-291 - [c76]Krzysztof Pietrzak:
Proofs of Catalytic Space. ITCS 2019: 59:1-59:25 - [c75]Krzysztof Pietrzak:
Simple Verifiable Delay Functions. ITCS 2019: 60:1-60:15 - [c74]Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
Adaptively Secure Proxy Re-encryption. Public Key Cryptography (2) 2019: 317-346 - [c73]Arka Rai Choudhuri
, Pavel Hubácek
, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. STOC 2019: 1103-1114 - [i57]Arka Rai Choudhuri, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir. Electron. Colloquium Comput. Complex. TR19 (2019) - [i56]Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:
Reversible Proofs of Sequential Work. IACR Cryptol. ePrint Arch. 2019: 252 (2019) - [i55]Arka Rai Choudhuri, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir. IACR Cryptol. ePrint Arch. 2019: 549 (2019) - [i54]Arka Rai Choudhuri, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:
PPAD-Hardness via Iterated Squaring Modulo a Composite. IACR Cryptol. ePrint Arch. 2019: 667 (2019) - [i53]Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter:
Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2019: 1489 (2019) - 2018
- [j7]Stefan Dziembowski
, Krzysztof Pietrzak, Daniel Wichs:
Non-Malleable Codes. J. ACM 65(4): 20:1-20:32 (2018) - [c72]Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár:
On the Memory-Hardness of Data-Independent Password-Hashing Functions. AsiaCCS 2018: 51-65 - [c71]Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak:
Sustained Space Complexity. EUROCRYPT (2) 2018: 99-130 - [c70]Bram Cohen, Krzysztof Pietrzak:
Simple Proofs of Sequential Work. EUROCRYPT (2) 2018: 451-467 - [c69]Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joël Alwen, Krzysztof Pietrzak:
SpaceMint: A Cryptocurrency Based on Proofs of Space. Financial Cryptography 2018: 480-499 - [i52]Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak:
Sustained Space Complexity. IACR Cryptol. ePrint Arch. 2018: 147 (2018) - [i51]Bram Cohen, Krzysztof Pietrzak:
Simple Proofs of Sequential Work. IACR Cryptol. ePrint Arch. 2018: 183 (2018) - [i50]Krzysztof Pietrzak:
Proofs of Catalytic Space. IACR Cryptol. ePrint Arch. 2018: 194 (2018) - [i49]Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
Adaptively Secure Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2018: 426 (2018) - [i48]Krzysztof Pietrzak:
Simple Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2018: 627 (2018) - 2017
- [j6]Eike Kiltz
, Krzysztof Pietrzak, Daniele Venturi
, David Cash, Abhishek Jain:
Efficient Authentication from Hard Learning Problems. J. Cryptol. 30(4): 1238-1275 (2017) - [c68]Hamza Abusalah
, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin:
Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space. ASIACRYPT (2) 2017: 357-379 - [c67]Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs:
Be Adaptive, Avoid Overcommitting. CRYPTO (1) 2017: 133-163 - [c66]Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak:
Depth-Robust Graphs and Their Cumulative Memory Complexity. EUROCRYPT (3) 2017: 3-32 - [c65]Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro:
Scrypt Is Maximally Memory-Hard. EUROCRYPT (3) 2017: 33-62 - [c64]Krzysztof Pietrzak, Maciej Skorski
:
Non-Uniform Attacks Against Pseudoentropy. ICALP 2017: 39:1-39:13 - [c63]Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak:
Position-Based Cryptography and Multiparty Communication Complexity. TCC (1) 2017: 56-81 - [i47]Krzysztof Pietrzak, Maciej Skorski:
Non-Uniform Attacks Against Pseudoentropy. CoRR abs/1704.08678 (2017) - [i46]Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak:
Sustained Space Complexity. CoRR abs/1705.05313 (2017) - [i45]Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact Security of PMAC. IACR Cryptol. ePrint Arch. 2017: 69 (2017) - [i44]Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs:
Be Adaptive, Avoid Overcommitting. IACR Cryptol. ePrint Arch. 2017: 515 (2017) - [i43]Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin:
Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space. IACR Cryptol. ePrint Arch. 2017: 893 (2017) - 2016
- [j5]Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs:
A counterexample to the chain rule for conditional HILL entropy. Comput. Complex. 25(3): 567-605 (2016) - [j4]Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact Security of PMAC. IACR Trans. Symmetric Cryptol. 2016(2): 145-161 (2016) - [c62]Hamza Abusalah
, Georg Fuchsbauer, Krzysztof Pietrzak:
Offline Witness Encryption. ACNS 2016: 285-303 - [c61]Hamza Abusalah
, Georg Fuchsbauer, Krzysztof Pietrzak:
Constrained PRFs for Unbounded Inputs. CT-RSA 2016: 413-428 - [c60]Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro:
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model. EUROCRYPT (2) 2016: 358-387 - [c59]Krzysztof Pietrzak, Maciej Skórski:
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations. TCC (B1) 2016: 183-203 - [c58]Georg Fuchsbauer, Felix Heuer, Eike Kiltz
, Krzysztof Pietrzak:
Standard Security Does Imply Security Against Selective Opening for Markov Distributions. TCC (A1) 2016: 282-305 - [i42]Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro:
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model. IACR Cryptol. ePrint Arch. 2016: 100 (2016) - [i41]Krzysztof Pietrzak, Maciej Skorski
:
Pseudoentropy: Lower-bounds for Chain rules and Transformations. IACR Cryptol. ePrint Arch. 2016: 159 (2016) - [i40]Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak:
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. IACR Cryptol. ePrint Arch. 2016: 389 (2016) - [i39]Joshua Brody, Stefan Dziembowski
, Sebastian Faust, Krzysztof Pietrzak:
Position-Based Cryptography and Multiparty Communication Complexity. IACR Cryptol. ePrint Arch. 2016: 536 (2016) - [i38]Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:
Robust Multi-Property Combiners for Hash Functions. IACR Cryptol. ePrint Arch. 2016: 723 (2016) - [i37]Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár:
On the Memory-Hardness of Data-Independent Password-Hashing Functions. IACR Cryptol. ePrint Arch. 2016: 783 (2016) - [i36]Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak:
Depth-Robust Graphs and Their Cumulative Memory Complexity. IACR Cryptol. ePrint Arch. 2016: 875 (2016) - [i35]Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro:
Scrypt is Maximally Memory-Hard. IACR Cryptol. ePrint Arch. 2016: 989 (2016) - 2015
- [c57]Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Generic Security of NMAC and HMAC with Input Whitening. ASIACRYPT (2) 2015: 85-109 - [c56]Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs:
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. ASIACRYPT (1) 2015: 121-145 - [c55]Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC. CRYPTO (1) 2015: 368-387 - [c54]Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak:
Proofs of Space. CRYPTO (2) 2015: 585-605 - [c53]Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak:
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. CRYPTO (1) 2015: 601-620 - [c52]Fabrice Benhamouda
, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak:
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings. ESORICS (1) 2015: 305-325 - [c51]Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak:
Condensed Unpredictability. ICALP (1) 2015: 1046-1057 - [c50]Krzysztof Pietrzak, Maciej Skorski:
The Chain Rule for HILL Pseudoentropy, Revisited. LATINCRYPT 2015: 81-98 - [c49]Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens:
Key-Homomorphic Constrained Pseudorandom Functions. TCC (2) 2015: 31-60 - [i34]Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak:
Condensed Unpredictability. CoRR abs/1504.07621 (2015) - [i33]Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Tight Bounds for Keyed Sponges and Truncated CBC. IACR Cryptol. ePrint Arch. 2015: 53 (2015) - [i32]Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens:
Key-Homomorphic Constrained Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2015: 180 (2015) - [i31]Maciej Skorski
, Alexander Golovnev, Krzysztof Pietrzak:
Condensed Unpredictability. IACR Cryptol. ePrint Arch. 2015: 384 (2015) - [i30]Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. IACR Cryptol. ePrint Arch. 2015: 401 (2015) - [i29]Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, Peter Gazi:
Spacemint: A Cryptocurrency Based on Proofs of Space. IACR Cryptol. ePrint Arch. 2015: 528 (2015) - [i28]Krzysztof Pietrzak, Maciej Skorski
:
The Chain Rule for HILL Pseudoentropy, Revisited. IACR Cryptol. ePrint Arch. 2015: 599 (2015) - [i27]Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak:
Offline Witness Encryption. IACR Cryptol. ePrint Arch. 2015: 838 (2015) - [i26]Felix Heuer, Eike Kiltz, Krzysztof Pietrzak:
Standard Security Does Imply Security Against Selective Opening for Markov Distributions. IACR Cryptol. ePrint Arch. 2015: 853 (2015) - [i25]Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs:
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. IACR Cryptol. ePrint Arch. 2015: 869 (2015) - [i24]Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Generic Security of NMAC and HMAC with Input Whitening. IACR Cryptol. ePrint Arch. 2015: 881 (2015) - 2014
- [j3]Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:
Robust Multi-Property Combiners for Hash Functions. J. Cryptol. 27(3): 397-428 (2014) - [c48]Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao:
Adaptive Security of Constrained PRFs. ASIACRYPT (2) 2014: 82-101 - [c47]Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact PRF-Security of NMAC and HMAC. CRYPTO (1) 2014: 113-130 - [c46]Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:
Key Derivation without Entropy Waste. EUROCRYPT 2014: 93-110 - [c45]Eike Kiltz
, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. Public Key Cryptography 2014: 1-18 - [c44]Dimitar Jetchev, Krzysztof Pietrzak:
How to Fake Auxiliary Input. TCC 2014: 566-590 - [i23]Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao:
Adaptive Security of Constrained PRFs. IACR Cryptol. ePrint Arch. 2014: 416 (2014) - [i22]Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact PRF-Security of NMAC and HMAC. IACR Cryptol. ePrint Arch. 2014: 578 (2014) - [i21]Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs:
A Counterexample to the Chain Rule for Conditional HILL Entropy. IACR Cryptol. ePrint Arch. 2014: 678 (2014) - [i20]Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak:
Constrained PRFs for Unbounded Inputs. IACR Cryptol. ePrint Arch. 2014: 840 (2014) - [i19]Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak:
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings. IACR Cryptol. ePrint Arch. 2014: 889 (2014) - 2013
- [c43]Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs:
Learning with Rounding, Revisited - New Reduction, Properties and Applications. CRYPTO (1) 2013: 57-74 - [c42]Eike Kiltz
, Krzysztof Pietrzak, Mario Szegedy:
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions. CRYPTO (1) 2013: 571-588 - [c41]Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia:
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It. TCC 2013: 23-39 - [i18]Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs:
Learning with Rounding, Revisited: New Reduction, Properties and Applications. IACR Cryptol. ePrint Arch. 2013: 98 (2013) - [i17]Krzysztof Pietrzak:
A Closer Look at HMAC. IACR Cryptol. ePrint Arch. 2013: 212 (2013) - [i16]Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:
Key Derivation Without Entropy Waste. IACR Cryptol. ePrint Arch. 2013: 708 (2013) - [i15]Stefan Dziembowski
, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak:
Proofs of Space. IACR Cryptol. ePrint Arch. 2013: 796 (2013) - [i14]Dimitar Jetchev, Krzysztof Pietrzak:
How to Fake Auxiliary Input. IACR Cryptol. ePrint Arch. 2013: 869 (2013) - 2012
- [j2]Krzysztof Pietrzak, Douglas Wikström:
Parallel Repetition of Computationally Sound Protocols Revisited. J. Cryptol. 25(1): 116-135 (2012) - [c40]Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes:
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise. ASIACRYPT 2012: 663-680 - [c39]